Calling out Cheaters: Covert Security With Public Verifiability.
Gilad AsharovClaudio OrlandiPublished in: IACR Cryptol. ePrint Arch. (2012)
Keyphrases
- security properties
- information flow
- security level
- information security
- security requirements
- security issues
- intrusion detection
- network security
- security policies
- computer security
- security problems
- access control
- risk assessment
- security mechanisms
- sensitive data
- security threats
- security management
- information assurance
- data integrity
- key management
- functional requirements
- neural network
- wireless sensor networks
- terrorist networks
- information systems
- security vulnerabilities
- social networks